Input validation error in rssh - CVE-2012-2251
Published: January 11, 2013 / Updated: August 11, 2020
Vulnerability identifier: #VU43210
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2012-2251
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: rssh.sourceforge.net
Affected software:
rssh
rssh
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
rssh 2.3.2, as used by Debian, Fedora, and others, when the rsync protocol is enabled, allows local users to bypass intended restricted shell access via a (1) "-e" or (2) "--" command line option.
How to mitigate CVE-2012-2251
Install update from vendor's website.
Sources
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html
- http://secunia.com/advisories/51307
- http://www.debian.org/security/2012/dsa-2578
- http://www.openwall.com/lists/oss-security/2012/11/27/15
- http://www.securityfocus.com/bid/56708
- https://bugzilla.redhat.com/show_bug.cgi?id=877279
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80334